info-cvs archive search

Search String: Display: Description: Sort:

Results:

References: [ pserver: 4404 ] [ security: 1340 ]

Total 529 documents matching your query.

341. Re: security concept - set permissions for each directory - how to? (score: 172)
Author: HIDDEN
Date: Tue, 29 Jan 2002 11:28:51 -0800 (PST)
Why does it need to work for both pserver /and/ SSH? Having SSH working should circumvent almost any need for pserver. Noel -- Wolfgang Kormann <address@hidden> wrote: _______________________________
/archive/html/info-cvs/2002-01/msg01010.html (6,307 bytes)

342. Re: security concept - set permissions for each directory - how to? (score: 166)
Author: HIDDEN
Date: Tue, 29 Jan 2002 14:00:23 -0500 (EST)
[...] The way CVS works, a user need read permission on a repository directory to read files in that directory (checkout, log, status, etc.) and write permission in a directory to write files in that
/archive/html/info-cvs/2002-01/msg01007.html (5,689 bytes)

343. security concept - set permissions for each directory - how to? (score: 166)
Author: HIDDEN
Date: Tue, 29 Jan 2002 18:53:50 +0100
hello, how can I build a security concept for CVS on SuSe Linux... - I'd like define groups - and it should be possible to set r/w rights on directories for this groups for example: cvsroot productA
/archive/html/info-cvs/2002-01/msg01005.html (5,121 bytes)

344. Re: ANN: cvssh - secure ext-to-pserver bridge (score: 128)
Author: HIDDEN
Date: Fri, 25 Jan 2002 21:22:40 -0800
Fine. CVS is BAD (broken as designed) in many ways. Fix the rest of it and pserver at the same time.
/archive/html/info-cvs/2002-01/msg00883.html (6,334 bytes)

345. Re: ANN: cvssh - secure ext-to-pserver bridge (score: 128)
Author: HIDDEN
Date: Fri, 25 Jan 2002 15:47:23 -0500 (EST)
[ On Friday, January 25, 2002 at 11:30:27 (-0800), Paul Sander wrote: ] And there's where your fatal flaw lies. CVS cannot, by design *and* implementation, possibly securely implement any even reason
/archive/html/info-cvs/2002-01/msg00880.html (6,696 bytes)

346. Re: ANN: cvssh - secure ext-to-pserver bridge (score: 135)
Author: HIDDEN
Date: Fri, 25 Jan 2002 14:56:53 -0500 (EST)
[ On Thursday, January 24, 2002 at 20:40:53 (-0500), Michal Wallace wrote: ] This has been discussed endlessly in this forum in the past.... :-) Ah, but is it protected from potential trojans -- i.e.
/archive/html/info-cvs/2002-01/msg00878.html (9,293 bytes)

347. Re: ANN: cvssh - secure ext-to-pserver bridge (score: 164)
Author: HIDDEN
Date: Fri, 25 Jan 2002 11:30:27 -0800
Kindly take my comments in context: Applications require a Unix user ID to run, especially if they write to the Unix filesystem. That's not the same thing as tracking their user bases. They can eith
/archive/html/info-cvs/2002-01/msg00877.html (8,364 bytes)

348. Re: ANN: cvssh - secure ext-to-pserver bridge (score: 110)
Author: HIDDEN
Date: Fri, 25 Jan 2002 12:38:06 -0500 (EST)
[ On Friday, January 25, 2002 at 00:24:31 (-0800), Paul Sander wrote: ] Yes, they do, since in particular this one uses the Unix filesytem and has no other means of controlling who has access to what
/archive/html/info-cvs/2002-01/msg00870.html (6,645 bytes)

349. Re: ANN: cvssh - secure ext-to-pserver bridge (score: 130)
Author: HIDDEN
Date: Fri, 25 Jan 2002 00:24:31 -0800
Applications don't require Unix user IDs to track their own user bases. You don't need *Unix security* to have *good security*, even on a Unix system. But obviously if an application does away with
/archive/html/info-cvs/2002-01/msg00846.html (7,022 bytes)

350. Re: ANN: cvssh - secure ext-to-pserver bridge (score: 117)
Author: HIDDEN
Date: Thu, 24 Jan 2002 20:40:53 -0500 (EST)
Hi Greg, You obviously have very strong feelings about this... Can you help me understand specifically what risks are involved? These are the precautions I'm taking: - The CVSROOT directory is read-o
/archive/html/info-cvs/2002-01/msg00835.html (7,581 bytes)

351. RE: Repository access question... (score: 12)
Author: HIDDEN
Date: Thu, 24 Jan 2002 18:01:31 -0500
Oh yeah, admin user cvs should be in all groups... cvs, public, company[abc] ur welcome. Sounds like a training issue. Also, easiest and most secure are generally mutually exclisive. :-) SSH is pret
/archive/html/info-cvs/2002-01/msg00831.html (6,961 bytes)

352. Re: Repository access question... (score: 15)
Author: HIDDEN
Date: Thu, 24 Jan 2002 23:40:46 +0100
Close, but I do not completely agree: - Admin group cvs-- nobody else, create an unpriviledged admin role user cvs - Set (almost, see next line) all files under $CVSROOT/CVSROOT to cvs:cvs - set $CVS
/archive/html/info-cvs/2002-01/msg00830.html (8,586 bytes)

353. Re: ANN: cvssh - secure ext-to-pserver bridge (score: 115)
Author: HIDDEN
Date: Thu, 24 Jan 2002 13:51:23 -0500 (EST)
[ On Wednesday, January 23, 2002 at 22:56:35 (-0800), Paul Sander wrote: ] No, they throw away any and all possibility of accountability, especially with CVS. Period. -- Greg A. Woods +1 416 218-0098
/archive/html/info-cvs/2002-01/msg00821.html (6,741 bytes)

354. Re: ANN: cvssh - secure ext-to-pserver bridge (score: 131)
Author: HIDDEN
Date: Wed, 23 Jan 2002 22:56:35 -0800
When someone uses shared accounts, they throw away Unix security. Maybe that's your point, but on the other hand Unix security is not needed in many carefully controlled situations. For example, if
/archive/html/info-cvs/2002-01/msg00791.html (7,888 bytes)

355. Re: ANN: cvssh - secure ext-to-pserver bridge (score: 110)
Author: HIDDEN
Date: Thu, 24 Jan 2002 01:19:10 -0500 (EST)
[ On Wednesday, January 23, 2002 at 20:02:55 (-0800), Paul Sander wrote: ] Because that's how Unix systems security works. -- Greg A. Woods +1 416 218-0098; <address@hidden>; <address@hidden>; <addre
/archive/html/info-cvs/2002-01/msg00790.html (6,637 bytes)

356. Re: Best way to plug the CVS Security hole? (score: 164)
Author: HIDDEN
Date: Thu, 13 Dec 2001 14:07:37 -0800 (PST)
Use SSH instead of pserver. __________________________________________________ Do You Yahoo!? Check out Yahoo! Shopping and Yahoo! Auctions for all of your unique holiday gifts! Buy at http://shoppin
/archive/html/info-cvs/2001-12/msg00375.html (5,741 bytes)

357. Best way to plug the CVS Security hole? (score: 161)
Author: HIDDEN
Date: Thu, 13 Dec 2001 07:18:33 -0800 (PST)
What's the best way to disable the update.prog and checkin.prog functionality? Currently I have commented out 2 REQ lines in the source that seem to call this functionality. Is this the best way to d
/archive/html/info-cvs/2001-12/msg00357.html (4,640 bytes)

358. Re: How best to secure CVS? (score: 17)
Author: HIDDEN
Date: Thu, 8 Nov 2001 11:00:22 -0500 (EST)
If you use pserver and don't correctly protect the CVSROOT/passwd file, it's trivially easy. The bottom line is that there are lots of different kinds of security and you need to decide exactly what
/archive/html/info-cvs/2001-11/msg00209.html (4,996 bytes)

359. Re: How best to secure CVS? (score: 15)
Author: HIDDEN
Date: Wed, 7 Nov 2001 19:46:44 -0500 (EST)
Use the ":ext:" method with SSH. Not. None. Zero. Zip. That's less likely, but not the real point of CVS security. That's only a very tiny part of the picture.... Why bother? Give everyone real accou
/archive/html/info-cvs/2001-11/msg00195.html (5,327 bytes)

360. Re: login problem (score: 9)
Author: HIDDEN
Date: Thu, 1 Nov 2001 11:25:10 -0500 (EST)
When you say you "logged in" your CVSROOT/passwd, do you mean you are using CVS to manage it? If so, did you add it to the checkout list file as discussed in <http://www.cvshome.org/docs/manual/cvs_2
/archive/html/info-cvs/2001-11/msg00019.html (5,109 bytes)


This search system is powered by Namazu